CVE-2021-32735

Cross-site scripting (XSS) from field and configuration text displayed in the Panel

Description

Kirby is a content management system. In Kirby CMS versions 3.5.5 and 3.5.6, the Panel's `ListItem` component (used in the pages and files section for example) displayed HTML in page titles as it is. This could be used for cross-site scripting (XSS) attacks. Malicious authenticated Panel users can escalate their privileges if they get access to the Panel session of an admin user. Visitors without Panel access can use the attack vector if the site allows changing site data from a frontend form. Kirby 3.5.7 patches the vulnerability. As a partial workaround, site administrators can protect against attacks from visitors without Panel access by validating or sanitizing provided data from the frontend form.

Categories

7.1
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.22%
Third-Party Advisory github.com Third-Party Advisory github.com
Affected: getkirby kirby
Published at:
Updated at:

References

Link Tags
https://github.com/getkirby/kirby/security/advisories/GHSA-2f2w-349x-vrqm patch third party advisory release notes
https://github.com/getkirby/kirby/releases/tag/3.5.7 patch third party advisory release notes

Frequently Asked Questions

What is the severity of CVE-2021-32735?
CVE-2021-32735 has been scored as a high severity vulnerability.
How to fix CVE-2021-32735?
To fix CVE-2021-32735, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2021-32735 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2021-32735 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-32735?
CVE-2021-32735 affects getkirby kirby.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.